10 Border Control And Identification Techniques

10.1163/ej.9789004162235.i-466.68

Brill’s MyBook program is exclusively available on
BrillOnline Books and Journals. Students and scholars affiliated with an
institution that has purchased a Brill E-Book on the BrillOnline platform
automatically have access to the MyBook option for the title(s) acquired by the
Library. Brill MyBook is a print-on-demand paperback copy which is sold at a
favorably uniform low price.

Chapter Summary

The aim of this chapter is to examine different identification to demonstrate how these techniques and technologies enable and facilitate police and border control co-operation. The objective is to examine their justifications and the problems they raise as regards the protection of persons. The chapter demonstrates how the information systems discussed in the preceding chapters are fed with information collected through the identification methods. A convergence of traditional techniques of control and modern biometric technologies has been demonstrated. The integration is predicated by the need for secure identification, security and the availability of biometric technologies. In particular, after 11 September, the use of biometric technologies for security and border control purposes has accelerated. Current data protection laws do not seem adequate, especially from the framework of transparency and proportionality adopted in this study. They may require to be brought in line with transparency and proportionality requirements discussed in this work.